咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300226 条 记 录,以下是1281-1290 订阅
排序:
An Avatar-Based Intervention System for Children with Autism Spectrum Disorder  7th
An Avatar-Based Intervention System for Children with Autism...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Liu, Leyuan You, Yuanjian He, Zhichen Chen, Jingying Cent China Normal Univ Natl Engn Res Ctr Elearning Wuhan 430079 Peoples R China Cent China Normal Univ Natl Engn Res Ctr Educ Big Data Wuhan 430079 Peoples R China
The defects in the mirror neuron system (MNS) make it challenging for children with autism spectrum disorder (ASD) to learn social skills through third-person digital agents. To help children with ASD circumvent defic... 详细信息
来源: 评论
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling  27th
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Depen...
收藏 引用
27th International Conference on Information Security
作者: Liao, Chengxiang Wang, Ruipeng Li, Yuwei Chen, Juxing Li, Yang Pan, Zulie Natl Univ Def Technol Changsha Peoples R China
The security of the kernel is crucial for the operating system (OS) and all user applications. Directed greybox fuzzing (DGF) is an efficient method for testing specific target sites in programs. Unlike conventional u... 详细信息
来源: 评论
Innovative Approaches to Analyze Truck Dwell Times in Seaport Environments  2nd
Innovative Approaches to Analyze Truck Dwell Times in Seapor...
收藏 引用
2nd Decision science Alliance International Summer Conference-DSA ISC
作者: Exposito-Marquez, Airam Lopez-Plata, Israel Exposito-Izquierdo, Christopher Univ Laguna C Padre Herrera S-N Santa Cruz de Tenerife 38200 Spain
This work presents a set of intelligent techniques aimed at analyzing and solving various issues regarding truck arrivals and stays at seaports. These techniques aim to optimize the truck arrival process, reduce dwell... 详细信息
来源: 评论
Exploring Hidden Behaviors in OpenMP Multi-threaded Applications for Anomaly Detection in HPC Environments  21st
Exploring Hidden Behaviors in OpenMP Multi-threaded Applicat...
收藏 引用
21st International Conference on Distributed Computing and Intelligent Technology
作者: Bhowmik, Biswajit Girish, K. K. Mishra, Pawanesh Mishra, Rishi Natl Inst Technol Dept Comp Sci & Engn Maharshi Sushrut CAS Lab BRICS Lab Mangalore Karnataka India
In high-performance computing (HPC), multi-threaded applications using OpenMP face complex challenges in identifying hidden performance issues, often due to resource conflicts, software inefficiencies, and hardware an... 详细信息
来源: 评论
Camouflaged Object Detection Based on Localization Guidance and Multi-scale Refinement  31st
Camouflaged Object Detection Based on Localization Guidance ...
收藏 引用
31st International Conference on Multimedia Modeling
作者: Wang, Jinyang Wu, Wei Inner Mongolia Univ Hohhot Peoples R China
Camouflaged Object Detection (COD) aims to visually segment camouflaged objects that blend into their surrounding environment. The problems of inaccurate object localization and lack of detailed information necessary ... 详细信息
来源: 评论
Web Privacy Perceptions Amongst Indian Users  20th
Web Privacy Perceptions Amongst Indian Users
收藏 引用
20th International Conference on Information Systems Security
作者: Priyadarsini, Gayatri Saxena, Anshika Dey, Aditi Prakriti Bichhawat, Abhishek Indian Inst Technol Gandhinagar Gandhinagar India
While personalized content in the digital world is necessary for a better browsing experience, users knowingly or unknowingly share a lot of data with third-party advertising networks, market analysts, and trackers. A... 详细信息
来源: 评论
DistillSleep: Leverage Self-distillation to Improve Performance After Representation Learning for Sleep Staging  31st
DistillSleep: Leverage Self-distillation to Improve Performa...
收藏 引用
31st International Conference on Multimedia Modeling
作者: Yu, Le Zhang, Xianchao Qian, Shuxia Sun, Hong Univ Sci & Technol China Hefei Anhui Peoples R China Jiaxing Univ Prov Key Lab Multimodal Perceiving & Intelligent Jiaxing Peoples R China Jiaxing Univ Affiliated Hosp 2 Jiaxing Peoples R China
Supervised learning for automatic sleep staging often requires large amounts of expert-labeled data. However, the rapid growth of data has not been matched by a corresponding increase in its effective utilization. Whi... 详细信息
来源: 评论
Tools at the Frontiers of Quantitative Verification QComp 2023 Competition Report  3rd
Tools at the Frontiers of Quantitative Verification QComp 20...
收藏 引用
3rd International TOOLympics Challenge
作者: Andriushchenko, Roman Bork, Alexander Budde, Carlos E. Ceska, Milan Grover, Kush Hahn, Ernst Moritz Hartmanns, Arnd Israelsen, Bryant Jansen, Nils Jeppson, Joshua Junges, Sebastian Koehl, Maximilian A. Koenighofer, Bettina Kretinsky, Jan Meggendorfer, Tobias Parker, David Pranger, Stefan Quatmann, Tim Ruijters, Enno Taylor, Landon Volk, Matthias Weininger, Maximilian Zhang, Zhen Brno Univ Technol Brno Czech Republic Rhein Westfal TH Aachen Aachen Germany Univ Trento Trento Italy Tech Univ Munich Munich Germany Univ Twente Enschede Netherlands Utah State Univ Logan UT USA Radboud Univ Nijmegen Nijmegen Netherlands Saarland Univ Saarland Informat Campus Saarbrucken Germany Graz Univ Technol Graz Austria Masaryk Univ Brno Czech Republic IST Austria Klosterneuburg Austria Lancaster Univ Leipzig Leipzig Germany Univ Oxford Oxford England Eindhoven Univ Technol Eindhoven Netherlands
The analysis of formal models that include quantitative aspects such as timing or probabilistic choices is performed by quantitative verification tools. Broad and mature tool support is available for computing basic p... 详细信息
来源: 评论
S-RFUP: Secure Remote Firmware Update Protocol  20th
S-RFUP: Secure Remote Firmware Update Protocol
收藏 引用
20th International Conference on Information Systems Security
作者: Podder, Rakesh Rios, Tyler Ray, Indrajit Raman, Presanna Righi, Stefano Colorado State Univ Ft Collins CO 80523 USA AMI US Holdings Inc Duluth GA USA
Traditional over-the-air (OTA) update mechanisms lack security features. As a result, OTA firmware updates expose a device to several threats including unauthorized update, introduction of malware in the firmware code... 详细信息
来源: 评论
A Systematic Literature Review on Conversational AI's Influence in Consumer Behavior  2nd
A Systematic Literature Review on Conversational AI's Influe...
收藏 引用
2nd Decision science Alliance International Summer Conference-DSA ISC
作者: Bara Iniesta, Marc Lopez, David EAE Business Sch Barcelona Spain ESADE Business Sch Barcelona Spain
In the dynamic realm of digital marketing, the integration of conversational artificial intelligence (AI) has emerged as a pivotal force reshaping consumer behaviors and market strategies. This paper presents a compre... 详细信息
来源: 评论